scholarly journals Quality of Service based Multicasting Routing Protocols for MANETs: A Survey

Author(s):  
Prabhat Kumar Sahu ◽  
Binod Kumar Pattanayak

The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscommunicating approach. Mobile ad hoc networks (MANETs) comprised of mobile nodes organize themselves insuch a manner that the can move freely inside the network and frequently change their position. Open architectureand dynamic nature of the network enhance its use in multimedia applications that needs graphics, audio, data,image, video and animation. Now a day’s the increasing use of multimedia and Internet technology needs quality ofservice (QoS) in MANETs in order to provide better service for the companies. This type of applications lendsthemselves well to multicast operations. As multicasting supports group oriented computing it can improve the QoSof the wireless medium by means of sending multiple copies of packets by exploring the internet broadcast propertiesof wireless transmission. Hence QoS multicasting plays a great role in MANETs for multimedia applications.However it is very difficult and challenging task to provide QoS multicasting. With unique features and by means ofdifferent recovery mechanisms, many researchers have been proposed various QoS based multicasting routingprotocols for MANETs. In order to assist QoS multicasting routing protocols design for MANETs, we characterizethe taxonomy of the multicast routing protocols and design features in this paper.

Author(s):  
Prabhat Kumar Sahu ◽  
Binod Kumar Pattanayak

The modern electronic age consists of many new approaches for the communication among the human civilizations and the AD HOC network is one of the successful self-configuring and infrastructure-less communicating approach. Mobile ad hoc networks (MANETs) comprised of mobile nodes organize themselves in such a manner that the can move freely inside the network and frequently change their position. Open architecture and dynamic nature of the network enhance its use in multimedia applications that needs graphics, audio, data, image, video and animation. Now a day’s the increasing use of multimedia and Internet technology needs quality of service (QoS) in MANETs in order to provide better service for the companies. This type of applications lends themselves well to multicast operations. As multicasting supports group oriented computing it can improve the QoS of the wireless medium by means of sending multiple copies of packets by exploring the internet broadcast properties of wireless transmission. Hence QoS multicasting plays a great role in MANETs for multimedia applications. However it is very difficult and challenging task to provide QoS multicasting. With unique features and by means of different recovery mechanisms, many researchers have been proposed various QoS based multicasting routing protocols for MANETs. In order to assist QoS multicasting routing protocols design for MANETs, we characterize the taxonomy of the multicast routing protocols and design features in this paper.


2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
B. Sivakumar ◽  
N. Bhalaji ◽  
D. Sivakumar

In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.


Mobile ad hoc networks (MANETs) are collection of nodes connected through wireless medium and do not require infrastructure for operation. Network Topology keeps on changing because mobility of nodes are high. Therefore, it is important for MANETs to provide excellent routing and security features. Since MANETs do not require any pre-existing infrastructure, they are extensively used in emergency and rescue and military applications. MANETs thus will form essentially an important part in wireless networks. In this paper, Ad hoc On-Demand Distance Vector (AODV) and Greedy Perimeter Stateless Routing (GPSR) routing protocol performance is compared with respect to Throughput and E2ED and observed that there is an improvement in throughput by 11% in case of GPSR. Simulation is performed using NS3.


Mobile ad hoc networks, abbreviated to MANETs are covering various application fields with the significant advancements in wireless networks. In the recent past, the multimedia transmission over such networks has drawn the attention from researchers and scientists. In wireless medium, it is always advantageous to go for multicast routing than unicast routing. This paper focuses on the performance analysis of a multicast routing protocol, multicast ad hoc on-demand distance vector (MAODV), and its modified version QoS-MAODV, to support multimedia transmission over ad hoc environments.


2020 ◽  
Vol 9 (1) ◽  
pp. 2006-2010

A Mobile Ad-hoc network (MANET) is a network which forms a kind of self organized network without any pre-established infrastructure over radio links. Mobile Ad Hoc Networks (MANETs) are more effective in node –to- node communication. In current era of technology where most of the things are based on networks, MANETs are more suitable for wireless communication and data transfer medium due to the advent of 3G, 4G & 5G technologies. The primary objective of such an ad-hoc network routing protocol is to create appropriate and efficient route between a pair of nodes so that messages can be transmitted in a timely fashion. The dynamic design of this network makes routing protocols a prominent part in creating efficient routes between pairs of nodes The design of routes should be achieved with minimal overhead and bandwidth usage In last two decades many multicast routing protocols are designed and implemented. This paper focuses on some of the MANETs protocols and their characteristics along with their advantages and disadvantages.


Author(s):  
J. Kaur ◽  
S. Kaur

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.


Sign in / Sign up

Export Citation Format

Share Document