scholarly journals Enhanced Power based Jamming Management Method for Mobile Ad Hoc Networks

2019 ◽  
Vol 8 (2) ◽  
pp. 5098-5102

The portable mobile network contains adaptable node which are shaped discretionarily. Recalling a definitive goal to keep away from impede, cross layer based blockage manage plot is anticipated for lessening the package occurrences in this system. The planned plot contains three stages. In first stage, the cross layer configuration is proposed to guarantee that the data contribution should be possible between the unquestionable layers in convention stack. In second stage, the blockage unmistakable verification plot is analyzed which accomplishes packet disaster rate and stop upscale factor. In third stage, blockage control is master utilizing cross layer move towards. Here the blockage course is settled in context of the way increase, bolster inhabitancy division. To give smallest centralities utilize and staying away from more blockages, vitality utilizes display and multipath organizing plan is required in structures. . In this study, developed an Efficient Energy based Congestion Control Scheme (EECCS) for jamming prevention and to get better energy efficiency of the mobile nodes[1]. The cross layer propose is deployed to get better the network performance. The multipath direction-finding is concentrating to stay away from jamming and to boost network life span.

Author(s):  
Abdalrazak Tareq Rahem ◽  
Mahamod Ismail ◽  
Nor Fadzilah Abdullah ◽  
Mohammed Balfaqih

<p><span>The resent application of wireless ad hoc networks (WANET) demands a high and reliable data load. The simultaneous transfer of large amounts of data different nearby sources to nearby destinations in a massive network under these circumstances results in the possibility of network congestion. Congestion is an extremely unwanted condition because it creates extra overhead to the already deeply loaded environment, which ultimately leads to resource exhaustion, and can lead to packet drops and retransmission at either the MAC or upper layers. We present a lightweight congestion control and early avoidance congestion control scheme, which can effective control congestion while keeping overhead to a minimum. This scheme is based on the Cross-layer between the MAC and network layers lead to early detection of congestion. With the help of node cooperation the sender node is triggered to find an alternative route based on TMT. This mechanism controls the network resources rather than the data traffic. Detailed performance results show enhancement in the throughput and packet delivery ratio, as well as a reduction in packet drop. Generally, network performance increases.</span></p>


Mobile Ad hoc Networks (MANET) comprises a collection of numerous mobile nodes that communicates with one other with no dependence on any predefined infrastructure in the network. The characteristics of MANET such as independent, wireless, and self-configuration of MANETs allows the suitability of various application scenarios. Cluster based Flooding is an important issue in the design of MANET where it is an order to manage data traffic as it utilizes a set of chosen nodes to transmit data between two nodes. MANET networks frequently structured with mobile devices for enabling data transmission. An essential process of selecting forwarding set in the inter-cluster flooding. The routing protocol employ in the network often defines the energy efficiency and network performance in ad hoc networks. This paper presents a new deterministic directed flooding scheme (D2FS) for effectively choose the forwarding set for effective inter-cluster flooding. In addition, a Cluster Based Flooding utilizing Fuzzy Logic Scheme (CBF2S) to effectively transmit data is also presented. The devised D2FS model is tested using NS2 tool with respect to the existence of diverse hop counts. An extensive experimentation takes place to prove the superiority of the D2FS with respect to overhead, communication overhead, traffic load, packet delivery ratio and end to end delay.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Yuhua Wang ◽  
Laixian Peng ◽  
Renhui Xu

The development of multibeam directional transmission technology used in vehicular ad hoc networks is drawing much more attention in recent years due to its wider coverage ability than omnidirectional transmission. In this paper, we analyse the transport capacity of the vehicular network using different antenna modes in the transmitter and receiver end, respectively. We first construct the cross-layer model comprising the characteristic of the directional antenna model, arbitrary network model, and interference model. Then, based on scaling laws, we calculate the upper and lower bound of the network capacity with and without the directional multibeam transmission technology. In order to reduce the capacity lower bound computation complexity, several topology frameworks are constructed while taking various interferences into account included in the actual project. Finally, we analyse the capacity under changes of different parameters and also evaluate the law of capacity changes to discover how much improvement multibeam transmission technology can bring to the network performance. Analysis shows that compared with DTOR and OTDR mode, DTDR mode can continue to increase network capacity by 2 to 3 times on the basis of the above two modes.


2013 ◽  
Vol 8 (1) ◽  
pp. 692-697
Author(s):  
Priyanka Sharma ◽  
PK Gaur ◽  
Lal Pratap Verma

The highly dynamic nature of MANETs results in frequent and unpredictable changes in the network topology, which add to the difficulty and complexity to routing among the mobile nodes within the network. Thus, establishing communication among mobile nodes is a great challenge in itself, resulting in network overloading & discarding of data packets. Nodes can change position quite frequently, which means we need a routing protocol that quickly adapts to the topology changes which is our objective.  In this paper focus has been put on the strategy to address the packet drop ratio which is an integral and important factor of communication in MANETs by minimizing the request zone. In Mobile Ad-Hoc Networks, as the coverage area increases the packet drop ratio also increases which degrades the network performance and Quality of Service (QOS).Location Aware Routing  will be used as a base protocol for the proposed work which is a class of Reactive protocol to design optimized routing algorithm.


Author(s):  
Jhum Swain ◽  
Binod Kumar Pattanayak ◽  
Bibudhendu Pati

A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysis on their performance. After detailed analysis and comparison, it was observed that when security features are imposed at different levels during routing, various protocols perform in different ways. Also, the network performance and network life times vary from one approach to another. So, this article also presents the effect of security features on data drop and delay of prominent protocols after simulation.


2018 ◽  
Vol 12 (2) ◽  
pp. 38-45 ◽  
Author(s):  
Jhum Swain ◽  
Binod Kumar Pattanayak ◽  
Bibudhendu Pati

A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysis on their performance. After detailed analysis and comparison, it was observed that when security features are imposed at different levels during routing, various protocols perform in different ways. Also, the network performance and network life times vary from one approach to another. So, this article also presents the effect of security features on data drop and delay of prominent protocols after simulation.


Author(s):  
Abdalrazak Tareq Rahem ◽  
Mahamod Ismail ◽  
Nor Fadzilah Abdullah ◽  
Mohammed Balfaqih

<p><span>The resent application of wireless ad hoc networks (WANET) demands a high and reliable data load. The simultaneous transfer of large amounts of data different nearby sources to nearby destinations in a massive network under these circumstances results in the possibility of network congestion. Congestion is an extremely unwanted condition because it creates extra overhead to the already deeply loaded environment, which ultimately leads to resource exhaustion, and can lead to packet drops and retransmission at either the MAC or upper layers. We present a lightweight congestion control and early avoidance congestion control scheme, which can effective control congestion while keeping overhead to a minimum. This scheme is based on the Cross-layer between the MAC and network layers lead to early detection of congestion. With the help of node cooperation the sender node is triggered to find an alternative route based on TMT. This mechanism controls the network resources rather than the data traffic. Detailed performance results show enhancement in the throughput and packet delivery ratio, as well as a reduction in packet drop. Generally, network performance increases.</span></p>


Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 185
Author(s):  
Muhammad Fayaz ◽  
Gulzar Mehmood ◽  
Ajab Khan ◽  
Sohail Abbas ◽  
Muhammad Fayaz ◽  
...  

A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile nodes without predefined and pre-established architecture where mobile nodes can communicate without any dedicated access points or base stations. In MANETs, a node may act as a host as well as a router. Nodes in the network can send and receive packets through intermediate nodes. However, the existence of malicious and selfish nodes in MANETs severely degrades network performance. The identification of such nodes in the network and their isolation from the network is a challenging problem. Therefore, in this paper, a simple reputation-based scheme is proposed which uses the consumption and contribution information for selfish node detection and cooperation enforcement. Nodes failing to cooperate are detached from the network to save resources of other nodes with good reputation. The simulation results show that our proposed scheme outperforms the benchmark scheme in terms of NRL (normalized routing load), PDF (packet delivery fraction), and packet drop in the presence of malicious and selfish attacks. Furthermore, our scheme identifies the selfish nodes quickly and accurately as compared to the benchmark scheme.


Sign in / Sign up

Export Citation Format

Share Document