scholarly journals Performance Evaluation of Different ToS Using Heterogeneous Communication Interfaces in FANETs

2022 ◽  
Vol 2 ◽  
Author(s):  
Laura Michaella B. Ribeiro ◽  
Ivan Müller ◽  
Leandro Buss Becker

The use of different types-of-services (ToS), such as voice, data, and video, has become increasingly present in the execution of applications involving networks composed of multiple UAVs. These applications usually require the UAVs to share different ToS in a dynamic and ad-hoc manner, such that they can support the execution of cooperative/collaborative tasks. The use of heterogeneous communication has showed gains in maintaining the connection among highly mobile nodes, while increasing the reliable transmission of data, as is necessary in MANETS, VANETs and, more recently, FANETs. The aim of this paper is to present a performance evaluation of a heterogeneous interface manager (IM), which applies a heuristic to choose the best among several single- and multi-band wireless communication interfaces, including IEEE 802.11n, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ax. Simulated scenarios with three, five, and eight UAV nodes are developed by integrating NS-3 and Gazebo simulation tools. The IM performance is analyzed by applying different numbers of interfaces and comparing with interfaces applied homogeneously by defining two set of results, in terms of application and MAC and PHY metrics, respectively. Finally, we also evaluate the associated performance, considering voice, data, and video streaming ToS. The results indicate that the combination of different interfaces has a very powerful effect on maintaining or increasing the communication intensity.

2017 ◽  
Vol 10 (3) ◽  
pp. 593-596
Author(s):  
Jitendra Soni ◽  
Kokila Uikey

Mobile ad-hoc Network [MANET] is the collection of mobile nodes deployed with the short-lived purpose. It is the most innovative and useful variety which provide the facility to establish communication without the prerequisite of any infrastructure. Here, wireless communication medium is usually used for communication and connection establishment purpose. Generally, it is deployed with mobile nodes but can be used for stationary design also. Open nature communication makes it vulnerable for several security threats. This paper has considered the simulation of AODV and ODMRP using Qualnet 5.2 simulator.


2021 ◽  
Vol 13 (11) ◽  
pp. 6187
Author(s):  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
Mangal Sain ◽  
Hoonjae Lee

An ad hoc network is a wireless mobile communication network composed of a group of mobile nodes with wireless transceivers. It does not rely on preset infrastructure and is established temporarily. The mobile nodes of the network use their own wireless transceivers to exchange information; when the information is not within the communication range, other intermediate nodes can be used to relay to achieve communication. They can be widely used in environments that cannot be supported by wired networks or which require communication temporarily, such as military applications, sensor networks, rescue and disaster relief, and emergency response. In MANET, each node acts as a host and as a router, and the nodes are linked through wireless channels in the network. One of the scenarios of MANET is VANET; VANET is supported by several types of fixed infrastructure. Due to its limitations, this infrastructure can support some VANET services and provide fixed network access. FANET is a subset of VANET. SANET is one of the common types of ad hoc networks. This paper could serve as a guide and reference so that readers have a comprehensive and general understanding of wireless ad hoc networks and their routing protocols at a macro level with a lot of good, related papers for reference. However, this is the first paper that discusses the popular types of ad hoc networks along with comparisons and simulation tools for Ad Hoc Networks.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Amit Singh ◽  
Nitin Mishra ◽  
Angad Singh

 A Wireless Mobile Ad-hoc Network consists of variety of mobile nodes that temporally kind a dynamic infrastructure less network. To modify communication between nodes that don’t have direct radio contact, every node should operate as a wireless router and potential forward knowledge traffic of behalf of the opposite node. In MANET Localization is a fundamental problem. Current localization algorithm mainly focuses on checking the localizability of a network and/or how to localize as many nodes as possible. It could provide accurate position information foe kind of expanding application. Localization provide information about coverage, deployment, routing, location, services, target tracking and rescue If high mobility among the mobile nodes occurs path failure breaks. Hence the location information cannot be predicted. Here we have proposed a localization based algorithm which will help to provide information about the localized and non-localized nodes in a network. In the proposed approach DREAM protocol and AODV protocol are used to find the localizability of a node in a network. DREAM protocol is a location protocol which helps to find the location of a node in a network whereas AODV is a routing protocol it discover route as and when necessary it does not maintain route from every node to every other. To locate the mobile nodes in a n/w an node identification algorithm is used. With the help of this algorithm localized and non-localized node can be easily detected in respect of radio range. This method helps to improve the performance of a module and minimize the location error and achieves improved performance in the form of UDP packet loss, received packet and transmitted packets, throughput, routing overhead, packet delivery fraction. All the simulation done through the NS-2 module and tested the mobile ad-hoc network.


2014 ◽  
Vol 13 (9) ◽  
pp. 4859-4867
Author(s):  
Khaled Saleh Maabreh

Distributed database management systems manage a huge amount of data as well as large and increasingly growing number of users through different types of queries. Therefore, efficient methods for accessing these data volumes will be required to provide a high and an acceptable level of system performance.  Data in these systems are varying in terms of types from texts to images, audios and videos that must be available through an optimized level of replication. Distributed database systems have many parameters like data distribution degree, operation mode and the number of sites and replication. These parameters have played a major role in any performance evaluation study. This paper investigates the main parameters that may affect the system performance, which may help with configuring the distributed database system for enhancing the overall system performance.


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Sign in / Sign up

Export Citation Format

Share Document