scholarly journals PENGEMBANGAN APLIKASI KOMUNIKASI PADA PERANGKAT ANDROID BERBASIS JARINGAN MANET UNTUK PENANGGULANGAN DAERAH BENCANA

2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Ahmad Sabiq

A communication system without network supporting is needed to resolve the paralyzed network and communication infrastucture caused by natural disaster. MANET (Mobile Ad-Hoc Network) is a network consisting of several mobile devices that communicates through wireless network without router. Mobile devices are not only used for voice and data transfer, but also as a router. This research develops a mobile application based on MANET that can communicate without network infrastructure. It can be used when the natural disaster damages the network infrastructure. The testing result shows the application, that runs under android platform, can communicate well in MANET network.Key Word: Ad-hoc network, manet, disaster recoveryPada kondisi bencana alam yang menyebabkan infrastruktur jaringan dan komunikasi lumpuh, dibutuhkan sebuah sistem komunikasi yang mampu digunakan tanpa adanya infrastruktur jaringan. Jaringan MANET (Mobile Ad-Hoc Network) merupakan jaringan yang terdiri dari beberapa perangkat bergerak yang berkomunikasi melalui jaringan nirkabel tanpa router yang secara khusus disediakan, sehingga semua perangkat bergerak yang digunakan selain berfungsi sebagai alat untuk komunikasi dan pertukaran data, juga berfungsi sebagai perantara komunikasi atau router. Pada penelitian ini, dibuat sebuah aplikasi untuk melakukan komunikasi pada perangkat android melalui jaringan tanpa infrastruktur berbasis MANET yang dapat digunakan pada penanggulangan bencana yang mengakibatkan lumpuhnya sarana jaringan dan komunikasi. Dari hasil pengujian, aplikasi yang telah dibuat dapat digunakan untuk berkomunikasi pada perangkat android berbasis jaringan MANET.Kata Kunci: Jaringan ad-hoc, manet, penanggulangan bencana

2017 ◽  
Vol 10 (1) ◽  
pp. 82-85
Author(s):  
Vikram Agrawal

MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.


Mobile adhoc networks (MANETs) have drawn attention to multitudinous consideration because of the univerality of mobile devices as well as the developments in wireless era. MANET is a peer-to-peer multi hop cellular wireless era community which does not have both difficult and speedy infrastructure and a relevant server. Every vertex of a MANET performs like a router and communicates with every unique. There exist numerous information duplication strategies which were presented to reduce the execution squalor. All are concluded that everyone cell vertices cooperate completely from the perspective of sharing their memory vicinity. But, via a few methods few vertices might additionally behave selfishly and determine simplest to cooperate in part or never with different vertices. The selfish vertices ought to then lessen the overall information approachability within the network. From this work, we try to take a look at the influence of selfish vertices in a mobile ad hoc community in terms of reproduction issuance i.e Selfish nodes are dealt with in replica allocation.


2020 ◽  
Vol 12 (4) ◽  
pp. 91
Author(s):  
Gleb Sergeevich Vasilyev ◽  
Oleg R. Kuzichkin ◽  
Dmitry I. Surzhik

Performance analysis is carried out, of a multiple input, multiple output (MIMO) ultraviolet (UV) communication system with a non-line-of-sight (NLOS) UV channel. The achievable bit error coefficient is calculated using three spatial multiplexing methods for different bitrate values, azimuthal deviation between the directional diagrams of an optical transmitter and an optical receiver, and different noise levels. Full Text: PDF ReferencesZ. Xu, B. Sadler, "Ultraviolet communications: potential and state-of-the-art", IEEE Commun. Mag. 4667-73 (2009). CrossRef D. Han, Y. Liu, K. Zhang et al., "Theoretical and experimental research on diversity reception technology in NLOS UV communication system", Opt. Expr. 20(14), 15833 (2012). CrossRef Q. Guo, N. He, Z. He, "Research on the channel performances and transmission in UV-LED scatter communications", Study Opt. Comm. 3, 64 (2013). DirectLink G. Chen, L. Liao, Z. Li et al., "Experimental and simulated evaluation of long distance NLOS UV communication", Communication Systems, Networks and Digital Signal Processing (CSND-SP), 9th Int. Symp. on IEEE, 904-909 (2014). CrossRef M.A. El-Shimy, S. Hranilovic, "Spatial-Diversity Imaging Receivers for Non-Line-of-Sight Solar-Blind UV Communications", J. Lightwave Techn. 33(11), 2246 (2015). CrossRef G. Shaw, M. Nischan, M. Iyengar, S. Kaushik, M. Griffin, NLOS UV communication for distributed sensor systems, Proc. SPIE 412683, 96 (2000). CrossRef I.S. Konstantinov, G.S. Vasyliev, O.R. Kuzichkin, D.I. Surzhik, I.A. Kurilov, S.A. Lazarev, "AUV Link Mobile Ad-Hoc Network Examination", J. Eng. Adv. Techn. 8(5S) July 2019 CrossRef I.S. Konstantinov, G.S. Vasilyev, O.R. Kuzichkin, I.A. Kurilov, S.A. Lazarev, "Modeling and Analysis of the Characteristics of Ultraviolet Channels under Different Conditions of Radiation Propagation for the Organization of Wireless AD-HOC Network", J. Adv. Res. Dynam. Contr. Syst. 07, 1853 (2018) DirectLink I.S. Konstantinov, G.S. Vasyliev, O.R. Kuzichkin, D.I. Surzhik, I.A. Kurilov, S.A. Lazarev, "Development Of Uv Communication Channels Characteristics Modeling Algorithm In A Mobile Ad-Hoc Network", J. Adv. Res. Dynam. Contr. Syst. 11(08), 1920 (2019). CrossRef G. Chen, F. Abou-Galala, Z. Xu, B.M. Sadler, "Experimental evaluation of LED-based solar blind NLOS communication links", Opt. Expr. 16(19), 15059 (2008). CrossRef


Author(s):  
Jürgen Dunkel ◽  
Ramón Hermoso

AbstractNowadays, most recommender systems are based on a centralized architecture, which can cause crucial issues in terms of trust, privacy, dependability, and costs. In this paper, we propose a decentralized and distributed MANET-based (Mobile Ad-hoc NETwork) recommender system for open facilities. The system is based on mobile devices that collect sensor data about users locations to derive implicit ratings that are used for collaborative filtering recommendations. The mechanisms of deriving ratings and propagating them in a MANET network are discussed in detail. Finally, extensive experiments demonstrate the suitability of the approach in terms of different performance metrics.


Author(s):  
Zhiyan A. Younis ◽  
Adnan Mohsin Abdulazeez ◽  
Subhi R. M. Zeebaree ◽  
Rizgar Ramadhan Zebari ◽  
Diyar Qader Zeebaree

Disasters could cause communication systems partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily maintainable to provide better services. Wireless ad-hoc networks could be the choice of establishing communication with the aid of existing infrastructure in a post-disaster case. In order to optimize mobile ad-hoc network performance, address the challenges that could lead to unreliable performance is required. One and most crucial key challenge is routing information from a sender to receiver. Due to the characteristics of a disaster environment such as signal attenuation, communication links exist between rescue crew is short-lived, suffer from frequent route breakage, and may result in unreliable end-to-end services. Many routing protocols have been proposed and evaluated in different network environments. This paper presents the basic taxonomy of Mobile Ad Hoc Networks and the state of the art in routing categorizes (Proactive, Reactive, Geographic-aware and Delay tolerant Networks (DTN)). The comparison of existing routing protocols in Mobile Ad-Hoc Networks indicates that overhead in Proactive and Geographic is competitive with delay in Reactive and DTN routing.


2013 ◽  
Vol 427-429 ◽  
pp. 2313-2316
Author(s):  
Cao Huang ◽  
Xiao Jun Guo ◽  
Ze Guo Liu

To support mobile communications in remote pastoral areas of Tibet effectively, this paper proposes an integrated wireless communication system including mobile ad hoc network (MANET), wireless senor network (WSN), cellular network and Beidou satellite network. The overall integrated wireless communication system and the relevant elements are described specifically. The proposed system can help to reduce the network deployment cost and provide voice, message and low rate data services.


Author(s):  
Layth A. Khalil Al Dulaimi ◽  
R. Badlishah Ahmad ◽  
Naimah Yaakob ◽  
Mohd Hafiz Yusoff ◽  
Mohamed Elshaikh

<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span><table class="MsoTableGrid" style="width: 444.85pt; border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;" width="593" border="1" cellspacing="0" cellpadding="0"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes; mso-yfti-lastrow: yes; height: 63.4pt;"><td style="width: 290.6pt; border: none; border-top: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; height: 63.4pt;" valign="top" width="387"><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;"><span style="mso-spacerun: yes;"> </span>A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span></p><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;">.</span></p></td></tr></tbody></table>


Author(s):  
Salman Ali Syed ◽  
Shahzad Ali

Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.


Sign in / Sign up

Export Citation Format

Share Document