scholarly journals Optimum Neighbors for Resource-Constrained Mobile Ad Hoc Networks

Author(s):  
Mohammed Tarique ◽  
Rumana Islam

This paper presents an investigation on the optimum number of neighbors for mobile ad hoc networks (MANETs). The MANETs are self-configuring and self-organizing networks. In such a network, energyconstrained mobile nodes share limited bandwidth to send their packets to the destinations. The mobile nodes have a limited transmission range and they rely on their neighbors to deliver their packets. Hence, the mobile nodes must be associated with the required (i.e., optimum) number of neighbors. As the number of neighbors is varied, a trade-off exists between the network connectivity and available bandwidth per mobile node. To investigate this issue, we consider Dynamic Source Routing (DSR) as the routing protocol and IEEE 802.11 as the MAC layer protocol in this work. We consider both static and dynamic scenarios in this work. We simulated the ad hoc networks via network simulator (NS-2) and the simulation results show that there exists an optimum number of neighbors for the static case. We also show that mobility has a grave impact on the performance of the MANETs in terms of network throughput, end-to-end delay, energy consumption, and packet loss. Hence, we need to increase the number of neighbors under mobility conditions. However, there is no global optimum number of neighbors for the mobility case.

Author(s):  
Wen-Jung Hsin ◽  
Lein Harn

Mobile ad hoc network is a network comprised of mobile nodes quickly forming an autonomous network for a particular purpose such as emergency search and rescue. One of the most prominent security challenges for such a network is the limited capacity in the mobile nodes, thereby preventing costly computation operations. However, this limitation on a mobile node manifests itself only when the mobile node is dispatched on an active duty (i.e., online). One can prepare the mobile nodes as much as possible offline in anticipation of an upcoming deployment. In this chapter, the authors present three offline/online authentication and key agreement schemes and one offline/online non-repudiation scheme, all aiming at fast online computation for mobile nodes in mobile ad hoc networks.


2014 ◽  
Vol 14 (1) ◽  
pp. 5343-5351
Author(s):  
Mahesh kumar Tiwari ◽  
UDAI SHANKAR ◽  
AJAY KUMAR

A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure support. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through Ad-Hoc routing protocols, But whenever any mobile node want to communicate to a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection with the internet node or host. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes. These Gateway nodes act as a bridge between the mobile ad hoc networks node and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet and going to propose a algorithm that reduce the discovery time of the gateway by selective forwarding and simultaneously also optimize the gateway discovery control overheads.


2005 ◽  
Vol 4 (2) ◽  
pp. 495-508 ◽  
Author(s):  
Deepak Kumar Patel ◽  
Rakesh Kumar

A mobile ad hoc network (MANET) consists of wireless mobile nodes without having a fixed infrastructure. The communication between these mobile nodes is carried out without any centralized control. The communication among the nodes within the infrastructure less networks is done through some routing protocol. But whenever any mobile node want to communicate a node in a network that is outside the ad hoc network such as internet, there should be an appropriate mechanism for establishing this connection. Gateway discovery is a fundamental process in connecting MANET with the internet. A mobile node can connect to the internet by discovery of some specialized nodes called as gateway nodes These Gateway nodes act as a bridge between the mobile ad hoc networks and the internet. The basic aim of the gateway discovery approach is to modify the route discovery process so that it is not only used for discovery of destination mobile nodes but also the gateways. In this paper we are going to present a review of various gateway discovery approaches which are used for establishing the interconnection of mobile ad hoc networks and internet.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
S. S. MANVI ◽  
M. M. KODABAGI ◽  
BHANU PRASAD

Ad-hoc wireless networks are power constrained as the nodes operate with limited battery energy. To maximize the lifetime of these networks, transactions through each mobile node must be controlled in such a way that the power dissipation rates for the nodes are almost the same. At the same time, providing QoS for ad-hoc networks is a complex task due to the ever-changing network topology. This paper addresses the problem of power and bandwidth aware routing. We propose a power and bandwidth aware source initiated routing model for mobile ad-hoc networks. The model uses both the static and mobile intelligent agents. The agents together find an optimal path among the available routes. The model is simulated to test its operational effectiveness in various network scenarios. We observed that the agents provide more flexible and adaptable routing services and also support component based software engineering features such as software reuse, maintainability, customization, and encapsulation.


2014 ◽  
Vol 2014 ◽  
pp. 1-6 ◽  
Author(s):  
B. Paramasivan ◽  
M. Kaliappan

Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.


Author(s):  
Nahida Nigar ◽  
Muhammad Anwarul Azim

Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which claim to have better throughput comparing with other TCP variants in a wired network. Fairness issues of TCP Variants in MANET including existing routing protocol are still unsolved. To determine the best TCP Variants in MANET environment over renowned routing protocol is the main objective of this paper. A Study on the throughput fairness of TCP Variants namely, Vegas, Reno, New Reno, SACK, FACK, and Cubic are performed via simulation experiment using network simulator (ns-2) over existing routing protocol, named, AODV, AOMDV, DSDV, and DSR. This fairness evaluation of TCP flows arranged a contrast medium for the TCP Variants using stated routing protocol in MANET. However, TCP Vegas obtain unfair throughput in MANET. The simulation results show that TCP Reno outperforms other TCP variants under DSDV routing protocol.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


2018 ◽  
Vol 8 (1) ◽  
pp. 2532-2536
Author(s):  
S. Jahanbakhsh Gudakahriz ◽  
S. Jamali ◽  
M. Vajed Khiavi ◽  
A. Soleimany

A mobile ad hoc network (MANET) is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.


Author(s):  
Haidar Safa ◽  
Zeina Koteiche

Service discovery plays a relevant role in mobile ad hoc environments. Indeed, upon joining a self-organizing network, mobile nodes should be able to explore the environment to learn about, locate, and share the available services. As a result, many researches were performed in this area. Recently, research is being directed towards integrating the service discovery into the routing protocols. This chapter presents the basic concepts of service discovery and their related issues. It also describes the service discovery challenges that arise due to the properties of mobile ad hoc networks. The chapter is concluded by presenting some observations and discussing the current challenges to provide guidelines for possible improvements.


Sign in / Sign up

Export Citation Format

Share Document