Design and Evaluation of Wi-Fi Offloading Mechanism in Heterogeneous Networks

2021 ◽  
Vol 17 (1) ◽  
pp. 60-70
Author(s):  
Vinoth Kumar V. ◽  
Ramamoorthy S. ◽  
Dhilip Kumar V. ◽  
Prabu M. ◽  
Balajee J. M.

In recent years, WiFi offloading provides a potential solution for improving ad hoc network performance along with cellular network. This paper reviews the different offloading techniques that are implemented in various applications. In disaster management applications, the cellular network is not optimal for existing case studies because the lack of infrastructure. MANET Wi-Fi offloading (MWO) is one of the potential solutions for offloading cellular traffic. This word combines the cellular network with mobile ad hoc network by implementing the technique of Wi-Fi offloading. Based on the applications requirements the offloading techniques implemented into mobile-to-mobile (M-M), mobile-to-cellular (M-C), mobile-to-AP (M-AP). It serves more reliability, congestion eliminated, increasing data rate, and high network performance. The authors also identified the issue while implementing the offloading techniques in network. Finally, this paper achieved the better performance results compared to existing approaches implemented in disaster management.

2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


Wireless devices utilization had increased drastically, which has shown an impact on over-all demand and utilization Mobile Ad-Hoc Network (MANET). Routing protocol is the fundamental and vital performance factor in the Mobile Ad-hoc Network (MANET). The routing protocols in MANET are accomplished to handle a lot number of nodes with restricted resources. Multiple routing protocols exist in MANETs. Once of the main challenges in routing protocols is its generation of adverse influence on network performance. Accordingly, this paper plans to implement an obstacle-ware MANET routing model using improved meta-heuristic-based A* algorithm. The algorithm efficiently plots a path between multiple nodes avoiding obstacles, or points, on the graph that results in producing a shortest path without any obstacles. The improved meta-heuristic algorithm termed as Fitness and Position Ratiobased Chicken Swarm Optimization (FPR-CSO) is used to improvise the A* algorithm. The comparative analysis of different optimized A* over Ad hoc On-Demand Distance Vector (AODV) confirms the consistent performance of the proposed model


2011 ◽  
Vol 7 (2) ◽  
pp. 102-106
Author(s):  
Taqwa Fahad ◽  
Abduladhim Ali

Most of routing protocols used for Mobile Ad hoc Network {MANET}, such as Ad hoc on demand distance vector {AODV} routing, uses minimum hops as the only metric for choosing a route. This decision might lead to cause some nodes become congested which will degrade the network performance. This paper proposes an improvement of AODV routing algorithm by making routing decisions depend on fuzzy cost based on the delay in conjunction with number of hops in each path. Our simulation was carried out using OMNeT++ 4.0 simulator and the evaluation results show that the proposed Fuzzy Multi-Constraint AODV routing performs better than the original AODV in terms of average end-to-end delay and packet delivery.


2017 ◽  
Vol 14 (1) ◽  
pp. 314-320
Author(s):  
V Vaneetha ◽  
C Vivekanandan

To improve the performance of Mobile ad hoc network (MANET), adequate time-varying interference prognoses can active adaptive design for transmission. Normally any inaccurate data transmissions are not identified initially after completion of data transmission that is detected, so lot of energy is wasted for communication. It misbehaves and affects the entire network performance. Proposed Inaccurate Packet Identification based on Pace allocation (IPPA) algorithm, if any Interference occurred that are identified by threshold value of node, node cross its threshold value, detects the attacks. Threshold value is fixed based on the battery level of all nodes process. In this work, time-varying interference can be evaluated at any period rather than considering it as long-term average effects. To enhance the network lifetime to attains mean value’s analytical results and in turn distance metric rate. The obtained simulation results authenticate the competent and accuracy of the missing data identification report and it reveals the reward of the scheme grand with the difficult Mobility. The analysis of the scheme provides better efficiency.


Author(s):  
Abdelsalam Abdelhamid Almarimi ◽  
Faraj Abdulaziz ◽  
Adel Elashheb

Author(s):  
A. Aranganathan ◽  
C.D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Author(s):  
A. Aranganathan ◽  
C. D. Suriyakala

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication. In cluster network, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gateways which is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data from neighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium. Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority to improve the network performance like high throughput, less latency time and improved certificate revocation time using ns2 simulators.


Sign in / Sign up

Export Citation Format

Share Document