scholarly journals Multicast Cooperative Routing For Opportunistic Data Transfer in Mobile Ad Hoc Network

2017 ◽  
Vol 12 (03) ◽  
pp. 26-33
Author(s):  
K. Vanisrsee ◽  
DR.V.S.K. Reddy
2017 ◽  
Vol 10 (1) ◽  
pp. 82-85
Author(s):  
Vikram Agrawal

MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.


Author(s):  
Layth A. Khalil Al Dulaimi ◽  
R. Badlishah Ahmad ◽  
Naimah Yaakob ◽  
Mohd Hafiz Yusoff ◽  
Mohamed Elshaikh

<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span><table class="MsoTableGrid" style="width: 444.85pt; border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;" width="593" border="1" cellspacing="0" cellpadding="0"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes; mso-yfti-lastrow: yes; height: 63.4pt;"><td style="width: 290.6pt; border: none; border-top: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; height: 63.4pt;" valign="top" width="387"><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;"><span style="mso-spacerun: yes;"> </span>A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span></p><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;">.</span></p></td></tr></tbody></table>


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Ahmad Sabiq

A communication system without network supporting is needed to resolve the paralyzed network and communication infrastucture caused by natural disaster. MANET (Mobile Ad-Hoc Network) is a network consisting of several mobile devices that communicates through wireless network without router. Mobile devices are not only used for voice and data transfer, but also as a router. This research develops a mobile application based on MANET that can communicate without network infrastructure. It can be used when the natural disaster damages the network infrastructure. The testing result shows the application, that runs under android platform, can communicate well in MANET network.Key Word: Ad-hoc network, manet, disaster recoveryPada kondisi bencana alam yang menyebabkan infrastruktur jaringan dan komunikasi lumpuh, dibutuhkan sebuah sistem komunikasi yang mampu digunakan tanpa adanya infrastruktur jaringan. Jaringan MANET (Mobile Ad-Hoc Network) merupakan jaringan yang terdiri dari beberapa perangkat bergerak yang berkomunikasi melalui jaringan nirkabel tanpa router yang secara khusus disediakan, sehingga semua perangkat bergerak yang digunakan selain berfungsi sebagai alat untuk komunikasi dan pertukaran data, juga berfungsi sebagai perantara komunikasi atau router. Pada penelitian ini, dibuat sebuah aplikasi untuk melakukan komunikasi pada perangkat android melalui jaringan tanpa infrastruktur berbasis MANET yang dapat digunakan pada penanggulangan bencana yang mengakibatkan lumpuhnya sarana jaringan dan komunikasi. Dari hasil pengujian, aplikasi yang telah dibuat dapat digunakan untuk berkomunikasi pada perangkat android berbasis jaringan MANET.Kata Kunci: Jaringan ad-hoc, manet, penanggulangan bencana


Author(s):  
Salman Ali Syed ◽  
Shahzad Ali

Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document