Traffic-Based S-MAC

Author(s):  
Odysseas Shiakallis ◽  
Constandinos X. Mavromoustakis ◽  
George Mastorakis ◽  
Athina Bourdena ◽  
Evangelos Pallis

Mobile Peer-to-Peer (MP2P) is a networking paradigm that will be exploited in the future to support technological advances and systems for the efficient provision of multiple services to mobile users. In a general context, the mobile community seeks to invest in on-the-fly services, by minimizing the effort and the increasing mobile users' performance. In this framework, the mobile Ad-Hoc Networks provide mobile nodes the flexibility of operating as flexible networking points, without the use of a centralized entity, where issues such as the energy consumption and the data packets transmission failure arise along with many more. Towards minimizing the factors that contribute to the increased consumption of the energy and the resources, as well as the loss of data, a Traffic-based S-MAC protocol is proposed in this paper to increase the data exchange and preserve the energy conservation, among the nodes in mobile Ad-Hoc Networks. The performance of the proposed protocol was thoroughly evaluated, by conducting multiple experimental results. The results verify the efficient performance of the protocol and indicate fields for further research and experimentation.

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
N. Chand

Mobile wireless networks allow a more flexible communication structure than traditional networks. Wireless communication enables information transfer among a network of disconnected, and often mobile, users. Popular wireless networks such as mobile phone networks and wireless local area networks (LANs), are traditionally infrastructure based—that is, base stations (BSs), access points (APs), and servers are deployed before the network can be used. A mobile ad hoc network (MANET) consists of a group of mobile hosts that may communicate with each other without fixed wireless infrastructure. In contrast to conventional cellular systems, there is no master-slave relationship between nodes, such as base station to mobile users in ad-hoc networks. Communication between nodes can be supported by direct connection or multi-hop relays. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment. All of these guarantee anywhere and anytime communication. Recently, mobile ad-hoc networks have been receiving increasing attention in both commercial and military applications.


Sign in / Sign up

Export Citation Format

Share Document