scholarly journals Performance evaluation of an IEEE 802.11b ad-hoc network

2004 ◽  
Vol 17 (1) ◽  
pp. 53-68
Author(s):  
Srdjan Krco ◽  
Marina Dupcinov ◽  
Sean Murphy

The performance of an IEEE 802.11b ad-hoc network that uses the AODV (Ad hoc On-demand Distance Vector) routing protocol is evaluated. One significant issue relating to the behavior of WLAN cards that has considerable impact on AODV performance was observed during the initial testing of the system and it is discussed and a solution proposed. Some aspects of the network performance are then assessed for several scenarios with low mobility. Route discovery latency results indicate that it is possible for mobile applications to operate reasonably well over ad-hoc networks in light to moderate traffic. UDP throughput results indicate that such networks could support tens of users using low-bit rate applications or possibly higher bit rates if applications generate data in bursts. Finally, some problems with TCP operating in this context were observed.

Author(s):  
Neelam Chauhan ◽  
Paramjeet Singh

An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises its view of the interconnection topology with other Mobile Hosts within the network. This amounts to a new sort of routing protocol. This paper is practically applied using the specifications that are defined through Highly Dynamic Destination Sequenced Distance Vector Routing Algorithm.


2018 ◽  
Vol 1 (4) ◽  
Author(s):  
Niloofar Movahedian Attar

The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an introduction to ad hoc networks, there are the AODV (Ad hoc On-demand Distance Vector) routing protocol with the node malicious behaviour and consequent damages to ad hoc networks. Then, trust is described as one of the solutions for identifying secure routes when there are malicious nodes in the network. Accordingly, the paper focuses on the proposed solutions that are based on the parameter trust and the prevention of the impact of malicious networks and vulnerable connections to identify a secure route. Then, an equation is presented to calculate trust using packet forwarding rate to select a secure route for sending data packets. The proposed model was implemented on OMNET++ to evaluate the network performance. The feature of the proposed method is better performance than of the methods TVAODV and AODV. Using the proposed method, packet delivery rate increases more significantly when malicious nodes increases than that of the basic method AODV and TVAODV. There is thus a lower packet dropping rate.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


2018 ◽  
Vol 7 (3.16) ◽  
pp. 76
Author(s):  
Deepak . ◽  
Rajkumar .

Vehicular ad hoc networks is an emerging area for researchers to provide intelligent transportation system to the society. It is due to the wide area of applications of VANETs interest is developed among the people from different countries to be a part of it. Therefore many projects had been started and also presently working to implement VANETs in real world scenario. The main challenge in its implementation is to provide a secure mechanism against the various attacks and threats that have the capability to bring the network performance significantly down. In this paper to overcome different types of authentication based attacks in VANETs an ECDSA based secure routing protocol SE-AODV is proposed with security features incorporated in already existing AODV routing protocol. The performance of SE-AODV is evaluated and compared with original AODV and AODV with black hole attack (BH-AODV). The SE-AODV shows better performance with the parameters used for comparison with the variation in vehicle density, speed of vehicles and simulation time. 


Mobile ad hoc networks (MANETs) are collection of nodes connected through wireless medium and do not require infrastructure for operation. Network Topology keeps on changing because mobility of nodes are high. Therefore, it is important for MANETs to provide excellent routing and security features. Since MANETs do not require any pre-existing infrastructure, they are extensively used in emergency and rescue and military applications. MANETs thus will form essentially an important part in wireless networks. In this paper, Ad hoc On-Demand Distance Vector (AODV) and Greedy Perimeter Stateless Routing (GPSR) routing protocol performance is compared with respect to Throughput and E2ED and observed that there is an improvement in throughput by 11% in case of GPSR. Simulation is performed using NS3.


2018 ◽  
Vol 7 (3) ◽  
pp. 1674
Author(s):  
Dania Mohammed ◽  
Ahmed Ghanim Wadday

the successful solutions used to manage traffic at intersections is the Vehicular ad hoc Network (VANET). The main problems in VANET are the preparation of the blocked route, repeated topology differences, and continuous vehicle movement. These problems are difficult to route data towards destinations. To work around this problem, use the Position-Based Routing Protocol (MDORA) name. One of the objectives of this protocol is to choose the best way to rely on the jump by the jump and on the footing of the farthest dis-tance of the interface from the source, thus ensuring the full transfer of data. This protocol reduces frequent connections by detecting the following packets and sending packets without first discovering the path. The environment is simulated by the Matlab program to show protocol results. The random distribution of nodes generation in the simulation environment has been changed in order to change con-tract locations compared to the first state of simulation and to show new result in second state of the protocol. as well The time unit value is also changed to reach the ratio of the number of dropped packets.  


2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


Author(s):  
Sudesh Kumar ◽  
Abhishek Bansal ◽  
Ram Shringar Raw

Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a wireless network through unmanned aerial vehicles (UAVs). In this network, the UAV nodes work as intermediate nodes that communicate with each other to transmit data packets over the network, in the absence of fixed an infrastructure. Due to high mobility degree of UAV nodes, network formation and deformation among the UAVs are very frequent. Therefore, effective routing is a more challenging issue in FANETs. This paper presents performance evaluations and comparisons of the popular topology-based routing protocol namely AODV and position-based routing protocol, namely LAR for high speed mobility as well as a verity of the density of UAV nodes in the FANETs environment through NS-2 simulator. The extensive simulation results have shown that LAR gives better performance than AODV significantly in terms of the packet delivery ratio, normalized routing overhead, end-to-end delay, and average throughput, which make it a more effective routing protocol for the highly dynamic nature of FANETs.


Sign in / Sign up

Export Citation Format

Share Document